0% found this document useful (0 votes)
53 views5 pages

Hardware and Embedded Security in The Context of Internet of Things

Uploaded by

Teddy Iswahyudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views5 pages

Hardware and Embedded Security in The Context of Internet of Things

Uploaded by

Teddy Iswahyudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Hardware and Embedded Security in the Context of

Internet of Things

Arun Kanuparthi Ramesh Karri Sateesh Addepalli


Polytechnic Institute of NYU Polytechnic Institute of NYU Cisco Systems
Brooklyn, NY - 11201. USA Brooklyn, NY - 11201. USA San Jose, CA - 95134. USA
[email protected] [email protected] [email protected]

ABSTRACT It will allow for new applications that tackle societal chal-
Internet of Things (IoT) is the interconnection of a large lenges by using unprecedented access to data. For instance,
number of resource-constrained devices such as sensors, ac- vehicular collisions, which kill thirty thousand people in the
tuators, and nodes that generate large volumes of data which US annually and injure almost a million more, may be tack-
are then processed into useful actions in areas such as home led by using embedded wireless sensors, monitors, and ac-
and building automation, intelligent transportation and con- tuators in automobiles. IoT will make it possible for emer-
nected vehicles, industrial automation, smart healthcare, gency workers to increase their effectiveness during disaster
smart cities, and others. Important challenges remain to ful- response by connecting to networks of robots. IoT is antic-
fill the IoT vision including data provenance and integrity, ipated to play a critical role in future megacities that are
trust management, identity management, and privacy. We instrumented with a myriad of sensors.
describe how embedded and hardware security approaches Security and privacy are key challenges to make the IoT
can be the basis to address these security challenges. a reality. They cannot be dealt with in an ad-hoc man-
ner using reactive approaches. A proactive approach is re-
quired, where trustworthiness is engineered upfront into IoT.
Categories and Subject Descriptors IoT must have strong security foundations built on a holis-
B.4 [Hardware]: Input/output data communications; C.3 tic view of security for all IoT components. Measures to
[Computer Systems Organization]: Special-purpose and address the realistic challenges of data provenance and in-
application-based systems tegrity, identity management, trust management, and pri-
vacy must be implemented. Absent strong security founda-
tions, attacks on and malfunctions in the IoT components
Keywords will outweigh any of its benefits.
Internet of Things, Security Architecture, Secure IoT Data provenance and integrity, identity management, trust
management, and privacy are four key challenges in design-
ing a secure IoT. Data provenance ensures that the source of
1. INTRODUCTION data is trustworthy. Data integrity ensures that the data has
The way our society interacts with technology is rapidly not been maliciously tampered with. Trust management en-
heading towards a major paradigm shift. Computing is be- sures trust in the devices. Identity management refers to the
coming centered on the vast amounts of data and informa- administration of individual identities. Privacy is essential
tion captured and made accessible as all humans and devices to ensure that the user’s data and credentials are under his
get connected into an Internet of Things (IoT) [8, 1]. IoT is control and no one else’s. Embedded and hardware security
an interconnection of a large number of networked devices. approaches can be leveraged to build a secure IoT. We focus
The interaction between smart machines and the environ- on securing the resource-constrained embedded devices (the
ment results in the generation of large volumes of data that sensors that collect the information, the nodes that process
may be processed into useful commands to control actuators. this information, and the actuators that perform the physi-
IoT will encompass medical implants, alarm clocks, wearable cal action). First we propose to integrate sensing with PUF
systems, automobiles, washing machines, traffic lights, and technology [13] for data provenance and integrity. Second,
the energy grid. It is expected that 50 billion devices will be we propose to use PUFs for identity management. Third,
interconnected by 2020, and this number is further expected we propose to use hardware performance counters [17] for
to reach a trillion [9]. trust management and to monitor the integrity of applica-
tions. Finally, we propose to use lightweight cryptography
Permission to make digital or hard copies of all or part of this work for personal or
to provide privacy.
classroom use is granted without fee provided that copies are not made or distributed The rest of the paper is outlined as follows. A generic IoT
for profit or commercial advantage and that copies bear this notice and the full cita- architecture and its threat model are described in Section
tion on the first page. Copyrights for components of this work owned by others than 2. The challenges involved in designing a secure IoT are
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- described in Section 3. We also describe how embedded and
publish, to post on servers or to redistribute to lists, requires prior specific permission hardware security approaches can be used to address these
and/or a fee. Request permissions from [email protected].
CyCAR’13, November 4, 2013, Berlin, Germany.
challenges. We conclude the paper in Section 4.
Copyright 2013 ACM 978-1-4503-2487-8/13/11 ...$15.00.
http://dx.doi.org/10.1145/2517968.2517976.

61
access points to access points to deliver a rich menu of ser-

Tier 4
Integration of IT Applications and Services vices such as saftey, traffic support, mobility and location
awareness, and support for real-time interactions. For in-
Federated Infrastructure
Tier 3
stance, a vehicle that is in the blind spot of another vehicle
(Compute, Storage, Network)
can sense a collision and communicate the alert the driver
to apply the brake. An STL may interact with other sen-
Tier 2

Gateway Gateway Gateway


sors to detect pedestrians, bikers, and measure the speed of
approaching vehicles. It may also interact with neighboring
STLs to coordinate the green traffic wave.
Tier 1

2.2 Vertical 2: Elderly Home


The instrumented home (of a Grandma) as it may evolve
in the next 10 years will be a controllable and programmable
platform. An elderly home may be instrumented with tech-
Vehicular Elderly Smart nologies such as pill bottles to ensure that medicines are
Communication Home City Block
Vertical 1 Vertical 2 Vertical 3 taken at the right time and the right dosage is administered,
Sensor Node Actuator
wearable devices to track the gait to detect falls and to mon-
itor balance issues and sensors that track food stored in the
Figure 1: An IoT architecture with three verticals of vehicu- kitchen. They may be supported by apps to recommend
lar communication, elderly home, and smart city block. The recipes based upon best-by dates and dietary recommenda-
four tiers in an IoT architecture are sensors network (con- tions, and to automatically request delivery to replenish food
sisting of sensors, nodes, and actuators), gateway, and fed- [16, 11]. However, without addressing security and privacy
erated infrastructure (with compute, network, and storage issues, such systems have not found traction.
capabilities), and integration of IT applications and services. 2.3 Vertical 3: Smart City Block
Co-optimization of water, electricity, temperature control,
2. AN IOT ARCHITECTURE and noise at the city block level is an example. The flow of
A typical IoT architecture performs: (i) sensing and data people in the city block (for example, around large build-
collection (using sensors), (ii) local embedded processing (at ings) can be monitored to optimize foot traffic on one hand
the node and gateway), (iii) activating devices based on com- and to schedule street cleaning to minimize disruption on
mands sent from the nodes (using actuators), (iv) wired the other hand. Within a building, elevator patterns can
and/or wireless communication (using low power wireless be monitored and adapted to conserve energy and/or re-
protocols), (v) automation (using software), and (vi) remote duce wait time based on the time of the day (peak versus
processing (federated compute-network-storage infrastruc- off-peak). At the individual worker level, one can moni-
ture). The IoT ecosystem is divided into four tiers to ac- tor the individual life style and usage patterns to program
complish the above mentioned tasks [5]. Figure 1 shows one his/her computing and communication devices to variable
IoT architecture that includes use cases of vehicular com- power input and output modes to balance her needs in the
munication, elderly home, and smart grid. context of critical environmental factors. An app can use
The first tier consists of sensors, actuators, and process- the customer calendar (meetings, lunch, desk time and gym
ing nodes. Sensors collect data. They typically have very time) to adjust the ambient environment parameters. Flow
low processing capability. Processing nodes process the data of emergency responders can be optimized to ensure their
collected by the sensor network to take necessary action. priority access to transit in emergencies.
The node has limited storage, low processing capability and
power budget. The second tier consists of the gateway. 2.4 Possible Threats in IoT
Gateway interfaces tier 1 to the outside world via the in-
IoT’s distributed nature and use of resource-constrained
ternet. It has good processing power and memory. Most
embedded devices in public areas make them easily exploitable.
state-of-the-art gateways also provide wireless communica-
Easily accessible sensors and actuators in unprotected zones,
tion [10]1 . In some cases gateway can be subsume the func-
such as city streets, are vulnerable to physical damage.
tionality of a node. The federated infrastructure that can
Figure 2 shows the threat model of the IoT architecture.
belong to Enterprise domain or Service provider domain has
Sensors can be tampered with to provide incorrect data
compute, network, and storage capabilities. This forms the
to the nodes, while the actuators may be sent commands
third tier. In addition to performing various aggregation,
from unauthorized sources to perform some physical ac-
management and service delivery functions it is capable of
tion. For instance, a malicious temperature sensor always
processing strong cryptographic algorithms that consume a
reports a fixed value, a tampered security camera may al-
lot of power. IT applications and services are integrated in
ways replay outdated video streams. Authentication fail-
the fourth tier.
ure at the sensor may give an attacker unauthorized access
2.1 Vertical 1: Vehicular Communication to private/confidential information. For instance, a faulty
home security sensor may not trigger an alarm and lets a
Vehicular communication offers a rich variety of connec- burglar access into the building. At the node level, the appli-
tivity and interactions: cars to cars, cars to access points cation running on the microcontroller may be compromised
(Wi-Fi, 4G, LTE, and Smart Traffic Lights (STLs)), and and may leak encryption keys, etc. Denial of service attacks
1 may be launched at the gateway, thereby preventing infor-
In some cases, the node may also be the gateway, capable
of directly communicating with the federated infrastructure. mation to be transmitted or received through the internet.
This is not shown in Figure 1. A secure IoT architecture must ensure end-to-end security.

62
Physical quantity
Sensor Response bits

Tier 4
Challenge bits PUF
Integration of IT Applications and Services

Figure 3: Traditional PUF produces the response based on


Tier 3

Federated Infrastructure
the challenge. Sensor PUF produces the response based on
(Compute, Storage, Network)
the challenge as well as the sensed physical quantity.
Tier 2

Attack on
Attack on Gateway Fed. Infra. • For a given binary challenge, a PUF always produces
gateway Attack on the same response.
node
• One challenge-response pair leaks nothing about other
pairs.
Tier 1

• The manufacturer of the PUF cannot predetermine the


mapping.
Attack on Sensor PUF is a Physical Unclonable Function (PUF) that
Attack on actuator co-mingles sensing with the challenge response processing of
sensor
Scope of this paper a PUF. A sensor PUF extends the functionality of conven-
tional physical unclonable functions to provide authentica-
Figure 2: Possible threats in IoT. Attacks can be launched tion, unclonability, and verification of a sensed value. The
on the sensors, nodes, gateway, and cloud. variation that a sensor PUF (shown in Figure 3) provides,
extends conventional PUFs by including two inputs: a phys-
ical quantity and a traditional binary challenge. A sensor
PUF has the following properties:
3. KEY CHALLENGES
Although IoT is potentially transformative, with a 14 tril- • For a given challenge and a given sensed quantity, the
lion dollar projected market [8], there has been little progress sensor PUF always produces the same response.
towards its vision beyond limited deployments in certain ver- • One challenge-quantity-response triple leaks nothing
ticals. The main reason for this lack of progress stems from about other triples.
serious concerns about the security, privacy, and trustwor-
thiness of such systems [12]. IoT elements monitor almost • The manufacturer of the sensor PUF cannot predeter-
every aspect of a person’s life. Hence, citizens have legit- mine the challenge-quantity-response mapping.
imate privacy concerns. Moreover, companies fear reputa-
This new class of sensors addresses the vulnerability in typ-
tional damage from data getting into the wrong hands and
ical sensing systems, in which an attacker can spoof mea-
governments worry about security risks. Security in the IoT
surements by interfering with the analog signals that pass
has been studied in the literature [12, 3, 7]. These studies
from the sensor element to the embedded microprocessor.
focus on the security at remote processing locations. They
By merging sensing with cryptography, sensor PUF provides
propose using lightweight cryptographic primitives in the
assurances about data integrity and forms the basis of data
resource-constrained embedded devices.
provenance and integrity.
The design of a secure IoT architecture involves address-
Example 1- Defense: For a given challenge and a given
ing the challenges of data provenance and integrity, identity
sensed quantity, the sensor PUF always produces the same
management, trust management, and privacy. We outline
response. This attack can be thwarted if the node can issue
these challenges and explain how embedded and hardware
different challenges to the sensor. This produces a differ-
security support can address these challenges.
ent responses (depending on the sensed quantity), those the
tampered sensor cannot generate. Thereby, providing assur-
3.1 Data Provenance and Integrity ance of the sensed value.
Trust in data is trust in the system. Ensuring the trust-
worthiness of data coming from IoT to applications that 3.2 Challenge 2: Identity Management
analyze that data and potentially actuate controls based on Identity management refers to the administration of indi-
this data requires that trust be addressed at both the pro- vidual identities within a system. Without unique, unforge-
ducer and the consumer side of this data [18]. The main able, and easily verifiable identities, there is no accountabil-
questions here are: How can the data coming from the sen- ity or deterrence. An identification system for IoT should
sor be trusted?, and How can we ensure that the integrity of scale to trillions of nodes. Not every IoT identity should
the data has not been compromised?. be directly accessible by external entities unless they are
AttackExample 1: A sensor is maliciously modified to authenticated [14]. The question here is: Is a sensor autho-
report incorrect values. For instance, a temperature sen- rized to send data to the node?
sor may be tampered to always report a certain value ir- Attack Example 2- Device A fakes the identity of Device
respective of the actual temperature. This problem can be B In this scenario, the device could be a sensor, node, or an
addressed at hardware level using sensor PUFs [13]. actuator. For instance, a malicious node fakes it’s identity
A traditional PUF [15] takes in a challenge and ideally as that of a genuine node and sends malicious commands to
produces a response with the following properties: the actuator to perform some actions.

63
Untrustworthy Table 1: NumChecker detection capabilities. The numbers
are deviations (%) from uninfected executions. Deviation of
more than 5% suggests a malicious modification. For each
App 1 App 2 App 3
rootkit, the bold number indicates the largest deviation [17].

Events System calls monitored


Profiler Rootkit counted sys open sys getde
-nts64
Operating System INST 836.1 242.9
SucKIT 1.3b RN 676.5 483.3
BR 1294.2 1028.1
Trustworthy INST 99.4 427.7
Adore 0.42 RN 123.5 650.0
Figure 4: Integrity checking using HPCs [17] BR 119.9 1313.1
INST 363.4 39.8
Sensor PUFs can provide unique IDs. Therefore, by ex- Sk2rc2 RN 488.2 95.8
ploiting the fact that the PUF can have exponential number BR 359.2 66.9
of challenge response pairs, where the response is unique for INST 827.8 244.4
each IC and each challenge, the threat of fake identities can Superkit RN 535.3 483.3
be neutralized by application of randomly chosen challenge- BR 1399.5 1014.4
response pairs [15].
Identity management at the higher levels (i) maintains a
repository of legitimate users, (ii) adds, modifies, and deletes not allowed. In order to provide trustworthiness in legacy
the contents of the repository, (iii) regulates user access, as well as low-cost systems, one can leverage hardware per-
enforces security policies and access privileges, (iv) reports formance counters (HPCs) that are present in all commod-
system activities and audits to verify past activities. ity processors. HPCs are registers that can monitor certain
The nodes have some processing power and are capable events that occur during the lifetime of a program.
of running applications on them to process the data. A The counters facilitate monitoring of the programs [17].
lightweight identity management application that performs As seen in Figure 4, when a program begins to run, the
the above mentioned tasks can be installed on the node. counters are activated by the Operating System. Depend-
This application collects data only from authorized sources ing on the model, the events can be counted periodically or
(sensors). The node must maintain a list of sensors which at the end of program execution. Using a mix of different
are authorized to send data. It also facilitates the addition events we can generate a model that is program and plat-
of new sources and removal of retired sources. Some amount form dependent. This model is used to monitor the software
of storage can be dedicated to log activities, or this data can integrity. One downside of using HPCs is that the approach
be transmitted to tier-3 for storage. is not very accurate and may produce false positives.
Example 2 - Defense: Since each device is augmented with In order to introduce new functionality, rootkits usually
a PUF, it has its own unique identity. By using different modify the original system calls. The difference in the num-
challenge-response pairs, the true identity of the device can ber of events between normal and infected executions is no-
be found. Thereby, differentiating a genuine device from a table. This abnormality helps in detecting rootkits. Table
fake device. 1 shows how various rootkits modified the original system
calls in a Linux 2.4 kernel were detected.
3.3 Challenge 3: Trust Management Defense Example 3: Tampering program execution intro-
duces significant deviation and can be detected using HPCs.
The distributed nature of the IoT and the strong human
component makes the creation of appropriate trust models
and trust managements systems challenging [4]. The ques- 3.4 Challenge 4: Privacy
tion here is: Can the device that is transmitting the data be The foundation of IoT applications is sensitive data pro-
trusted? A root of trust is necessary to build a chain of trust vided by users and their devices. Privacy enhancing tech-
and ensure trustworthiness. The root of trust begins at the nologies can protect users sensitive data while still preserv-
hardware level [6]. ing the functionality of higher-level applications.
Much of the power of IoT, comes from applications that Attack Example 4- Protection against eavesdropping at-
process the data that is sent by the sensors and from the ac- tack: An adversary attempts to eavesdrop on the commu-
tuators that exert physical action. These applications must nication between the devices 6and retrieve private informa-
be trustworthy and must be protected against attackers try- tion.
ing to exploit the vulnerabilities such as unchecked buffers in Confidentiality of data can be ensured by using lightweight
these applications [2]. Also, the actuators must be protected encryption algorithms. Implementing policies that require
from bogus inputs from unauthorized sources. approval from the user to participate in the IoT can alle-
Attack Example 3- Tampering the application on the node: viate the privacy concerns of users. For instance, sensors
An attacker may attempt to exploit vulnerabilities in the send push notifications to users before collecting their pri-
applications running on the node, which process the data vate data.
collected from the sensors and send commands to the actu- Example Defense 4: All communication from the sensor to
ators. Alternatively, an attacker may attempt to surrepti- the node, or from the node to the actuator is encrypted using
tiously execute a rootkit. lightweight encryption algorithms. This communication is
Legacy systems have all the infrastructure and software in confidential to an adversary attempting to eavesdrop on this
place and making radical changes to the hardware is usually communication. This way, privacy is ensured.

64
Table 2: Summary of security challenges in IoT and corre- 5. REFERENCES
sponding hardware/embedded security support.
[1] Internet of Things - Architecture.
Hardware/Embedded
www.iot-a.eu/public, 2013.
Challenges Security Support [2] Aleph One. Smashing the stack for fun and profit.
Data Provenance and Integrity Sensor PUF Phrack magazine, 7(49):365, 1996.
Identity Management Sensor PUF, PUF [3] S. Babar, A. Stango, N. Prasad, J. Sen, and
Trust Management PUF, HPCs R. Prasad. Proposed embedded security framework for
Privacy Lightweight encryption internet of things (iot). In Wireless Communication,
Vehicular Technology, Information Theory and
Table 3: Recommendations on lightweight cryptographic Aerospace Electronic Systems Technology (Wireless
primitives to be used at each tier of IoT VITAE), 2011 2nd International Conference on, pages
1–5, 2011.
Sensor Node Gateway Fed. Infr. [4] M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized
Data < 10 B < 1 MB < 1 GB 1 GB trust management. In Security and Privacy, 1996.
size Proceedings., 1996 IEEE Symposium on, pages
Enc/Dec PRESENT CLEFIA AES RSA
mCRYPTON AES ECC
164–173. IEEE, 1996.
Hash DM-PRESENT PROP HMAC SHA-3 [5] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog
Key Ex. DH-512 DH-512 ECDH DH computing and its role in the internet of things. In
Digital ECDSA-163 ECDSA, DSA ECDSA Proceedings of the first edition of the MCC workshop
Sign. -233 409 on Mobile cloud computing, pages 13–16. ACM, 2012.
[6] D. Champagne and R. B. Lee. Scalable architectural
In short, sensor PUFs address the challenge of data prove- support for trusted software. In High Performance
nance and integrity. Sensor PUFs and PUFs can be used Computer Architecture (HPCA), 2010 IEEE 16th
for identity management; PUFs and hardware performance International Symposium on, pages 1–12. IEEE, 2010.
counters can be used for trust management. Lightweight [7] D. Chen, G. Chang, L. Jin, X. Ren, J. Li, and F. Li. A
encryption algorithms can support confidentiality and pri- novel secure architecture for the internet of things. In
vacy to users. Table 2 summarizes the challenges and hard- Genetic and Evolutionary Computing (ICGEC), 2011
ware/embedded security solutions. Fifth International Conference on, pages 311–314,
2011.
3.5 Other Security Requirements [8] M. Chui, M. LÃűffler, and R. Roberts. The Internet of
In addition to the challenges mentioned in Section 3, a A Things. McKinsey and Co. Quarterly Journal, 2010.
secure architecture must support confidentiality, integrity, [9] Cisco. The Internet of Things - How the Next
availability, authenticity, and non-repudiation; the IoT is Evolution of the Internet is Changing Everything,
no different. These are accomplished using cryptographic 2011.
primitives such as encryption algorithms, hash functions,
[10] Cisco Systems. Cisco 819 4G LTE M2M Gateway
digital signatures, and key exchange algorithms.
Integrated Service Router.
It is crucial to choose the appropriate cryptographic algo-
[11] J. Heitzeberg. Lively: Smart Sensors for Elderly Loved
rithm that does not consume too much power. For instance,
Ones, 2013.
if the amount of data to be processed is less than 1 KB, the
processing can be done on the sensor itself, else it can be sent [12] R. Roman, P. Najera, and J. Lopez. Securing the
to the node for processing. The node is capable of processing internet of things. Computer, 44(9):51–58, 2011.
data under 1 MB. The gateway and federated infrastructure [13] K. Rosenfeld, E. Gavas, and R. Karri. Sensor physical
can process data upto 1 GB and greater than 1 GB, respec- unclonable functions. In Hardware-Oriented Security
tively. By doing localized processing, data processing in tier and Trust (HOST), 2010 IEEE International
3 can be avoided. This localized processing results in faster Symposium on, pages 112–117. IEEE, 2010.
response times. Table 3 shows the cryptographic primitives [14] J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: A
that can be used at each tier of the IoT. Capability System. 1999.
[15] G. E. Suh and S. Devadas. Physical unclonable
4. CONCLUSION functions for device authentication and secret key
generation. In Proceedings of the 44th annual Design
We identified four key challenges in designing a secure
Automation Conference, pages 9–14. ACM, 2007.
IoT: data management, identity management, trust manage-
[16] The Economist. Care for the elderly: An age old
ment, and privacy. We describe how embedded and hard-
problem, 2011.
ware security approaches can be used to address these chal-
lenges in the context of an IoT. We propose the use of Sen- [17] X. Wang and R. Karri. Numchecker: Detecting kernel
sor PUFs to address the challenge of data provenance and control-flow modifying rootkits by using hardware
integrity. Sensor PUFs and PUFs can be used for identity performance counters. In Design Automation
management; PUFs and hardware performance counters can Conference (DAC), 2013 50th ACM / EDAC / IEEE,
be used for trust management. Lightweight encryption al- pages 1–7, 2013.
gorithms can be used to provide confidentiality and privacy [18] K. Xu, H. Xiong, C. Wu, D. Stefan, and D. Yao.
to the users. Data-provenance verification for secure hosts.
Dependable and Secure Computing, IEEE
Transactions on, 9(2):173–183, 2012.

65

You might also like